similar to: ipfwadm and filtering ICMP?

Displaying 20 results from an estimated 7000 matches similar to: "ipfwadm and filtering ICMP?"

1998 Jun 17
0
Re: Linux and IPFWADM
On Tue, 16 Jun 1998, Avery Pennarun wrote: > Here is the script I use on my home IP masquerade system. It is designed > to deny everything except what is specifically allowed in some of the > definitions near the top. Note that there is one fatal problem -- the > input firewall is changed to allow incoming data back to ports 1024 > through 65535, because any of those might have
1998 Jul 30
0
ipfwadm configuration utility
* I sent this to the guy doing the Securing RH 5.x online book, but this is not RedHat specific, should be good for all Linux'es (?). I haven't seen anything on here about this, so my apologies if maybe I missed it. >Date: Thu, 30 Jul 1998 08:37:27 -0400 >From: Alan Spicer <aspicer@ebiznet.com> >Organization: Electronic Business Network >X-Mailer: Mozilla 4.05 [en]
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan
1998 Jun 20
0
Named and Firewalls
Since it seems that named is theme of the month. I though I would present an example of using firewall to protect your bind service. One of reasons for presenting is that in all examples shown so far it seemed that everyone suggested to leave named full-open. However, it does not always have to be case. Say, if you are running an private network then you want just to allow named get data
2002 Jul 06
0
FW: Newbie Help
I guess you are in what I think of as "Newbie Hell." It sounds like you are learning linux like a lot of people, all by yourself. That's how I did it, and it is maddening and worse, very time consuming. The important thing is not to keep hitting your head against the brick wall over and over. So, what to do. First, I would join a linux email support group. I belong to a very good
1998 Oct 13
5
compare / contrast of linux fw and others
Hi, I was wondering how a linux box configured as a firewall stacked up against some of the commercial products like checkpoint-1 and gauntlet. Can someone direct me to a good book or online doc that compares linux to some other firewall methods? Mind you, I''m not talking about a firewall in the classical sense, ie ip forwarding turned off and used as a proxy, but the typical Linux box
2009 Aug 18
3
Rules based on ipmasq
Hi, I had installed squid with ntlm authentication and content filtering from this tutorial: http://www.howtoforge.com/dansguardian-with-multi-group-filtering-and-squid-with-ntlm-auth-on-debian-etch. Next to last point is firewall configuration by ipmasq but I have installed shorewall. This is content of I89tproxy.rul file: #!/bin/sh # # redirect http requests to non-local hosts to the
1998 Oct 06
1
Unwanted browse lists
Michel, One approach that hasn't been suggested is to block access to the netbios nameservice port on the samba host with a firewalling rule. That way the other computers on the subnet can't register themselves with nmbd. Suppose that your internal network is all within the 192.168.15.0/24 network. Each Windows workstation will automatically announce itself with a udp packet broadcast
1998 Dec 05
8
portmap vulnerability?
Are there any known vulnerabilities in portmap (redhat''s portmap-4.0-7b)? I''ve been receiving a lot of attempts to access the portmap port on some linuxppc machines I administer by various machines which clearly have no business with mine, and I wonder if this is an attempt to break in to my machines. I''ve searched some archives, but I haven''t yet found any
1998 May 27
0
Updated: Sentry Port Scan Detector 0.60
Hello, I would normally not write this list to announce an update to a software package, however there have been a number of very significant changes to this program that users of it may want to upgrade and new users may want to check out. What it is =-=-=-=-=- Sentry is a port scan detector for Linux, *BSD, and most UNIX variants. What it does =-=-=-=-=-=- Sentry monitors your systems for
2013 Dec 12
1
Need help in addressing this error - ERROR OpenSSL::SSL::SSLError: SSL_accept returned=1 errno=0 state=SSLv3 read client certificate A: tlsv1 alert unknown ca
Hi , I am new to this puppet. I am implementing a network where my cisco switch will contact the puppet server for getting the configuration. I tried installing open source puppet and was successful in pushing down the configurations. I wanted then to try the same exercise with puppet enterprise 3.1. I installed puppet enterprise in a different server and changed my puppet agent (switch) to
2004 Mar 01
0
filtering icmp - second try
Hi All Is the filter rule bellow supposed to classify icmp request/reply packets? $TC filter add dev eth2 protocol ip \ parent 1:0 prio 1 u32 \ match ip dst 192.168.0.1 \ match icmp type 8 0xff flowid 100 $TC filter add dev eth2 protocol ip \ parent 1:0 prio 1 u32 \ match ip dst 192.168.0.1 \ match icmp type 0 0xff flowid 100 it is accepted by tc but I think it is not
2004 Feb 28
0
filtering icmp
Hi All Is the filter rule bellow supposed to classify icmp request/reply packets? $TC filter add dev eth2 protocol ip \ parent 1:0 prio 1 u32 \ match ip dst 192.168.0.1 \ match icmp type 8 0xff flowid 100 $TC filter add dev eth2 protocol ip \ parent 1:0 prio 1 u32 \ match ip dst 192.168.0.1 \ match icmp type 0 0xff flowid 100 it is accepted by tc but I think it is not
1998 May 09
4
Apparent SNMP remote-root vulnerability.
I just had a remote root break-in on my machine (x86 running Red Hat Linux 5.0 with all the updates except for kernel-2.0.32-3) this morning at 06:03:28 EDT. From what I''ve been able to gather, it appears to have been through snmpd, which I missed when I was weeding out unused daemons. Sorry for the feeble message, but all I know (or at least strongly suspect) is that there''s a
1998 Jun 14
14
SSH w/ttysnoop
I was wondering if anyone here has or knows how to implement ttysnoop w/ssh ?
2004 May 28
0
Mounting file shares in UTF-8
Hi, I've searched for lots of messages similar to this, but none as detailed as this, and I haven't seen an answer that helps me. I have a Win 2000 machine that has some file shares on it. These shares are international; files and directories have characters from many languages. The system codepage is set to 932. I'm using the smb binaries from samba 3 to mount these shares on a
2008 Apr 24
0
R crashes while running a positive checked script (PR#11264)
Full_Name: Bas Zimmerman Version: 2.7.0 (2008-04-22) OS: Windows 2000 Pro SP 4 Eng Submission from: (NULL) (62.51.53.106) Running the following line of the R-code SurvivalEnsembles.R, part of the MBoost package results in a program crash: 'AMLrf <- cforest(I(log(time)) ~ ., data = AMLlearn, control = ctrl, weights = AMLw)' This package received a OK-check, see
2016 May 11
0
Ogg Format
Hello Ralph I ran the opusenc.exe on a wave file and checked the OpusTag section. My concern is on Total Segment Size being >> than the actual data being put. Is this just an example of implementation or does a size of 764 BYTES kept as a place holder for putting more data? 4f 67 67 53 = Oggs 00 = Version 00 = Header 00 00 00 00 00 00 00 00 = Granule Position a5 73 00 00 = Bit Stream
2016 May 11
0
Ogg Format
Hello Jean-Marc, So for the moment we can assume that this method is also OK to use? On Embedded Systems, both SRAM and Flash can be a restricting factor besides the compute time. To optimize the utilization of embedded resources, may I suggest a simplification of the Ogg-Opus format and can this be considered by the Opus org and IETF as an addition? Regards Amit On Wed, May 11, 2016 at 12:09
1999 Jan 13
1
Secure? Samba over internet
I'd like comments (suggestions, improvements, messages that start with "you moron you forgot that. . .") on the following horrible dirty kludge to make a (nearly, with any luck) un-hackable set of shares available to specific users on the internet. On the Server, initially all packets bound for port 139 are rejected as the default policy. The server is connected to the internet full